Nick Howgrave-Graham

According to our database1, Nick Howgrave-Graham authored at least 32 papers between 1997 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Reduced and Fixed-Complexity Variants of the LLL Algorithm for Communications.
IEEE Trans. Commun., 2013

2010
Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign.
Proceedings of the LLL Algorithm - Survey and Applications, 2010

New generic algorithms for hard knapsacks.
IACR Cryptol. ePrint Arch., 2010

Variants of the LLL Algorithm in Digital Communications: Complexity Analysis and Fixed-Complexity Implementation
CoRR, 2010

2009
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Divisors in residue classes, constructively.
Math. Comput., 2008

2007
Effective LLL Reduction for Lattice Decoding.
Proceedings of the IEEE International Symposium on Information Theory, 2007

A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU.
Proceedings of the Advances in Cryptology, 2007

2006
Testing set proportionality and the Ádám isomorphism of circulant graphs.
J. Discrete Algorithms, 2006

Symplectic Lattice Reduction and NTRU.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Rankin's Constant and Blockwise Lattice Reduction.
Proceedings of the Advances in Cryptology, 2006

2005
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3.
IACR Cryptol. ePrint Arch., 2005

On estimating the lattice security of NTRU.
IACR Cryptol. ePrint Arch., 2005

Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign.
IACR Cryptol. ePrint Arch., 2005

Choosing Parameter Sets forwithand.
Proceedings of the Topics in Cryptology, 2005

2004
Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures.
IACR Cryptol. ePrint Arch., 2004

A Method to Solve Cyclotomic Norm Equations.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004

2003
Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation.
Math. Comput., 2003

NAEP: Provable Security in the Presence of Decryption Failures.
IACR Cryptol. ePrint Arch., 2003

NTRUSIGN: Digital Signatures Using the NTRU Lattice.
Proceedings of the Topics in Cryptology, 2003

The Impact of Decryption Failures on the Security of NTRU Encryption.
Proceedings of the Advances in Cryptology, 2003

The Insecurity of Esign in Practical Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
Paillier's Trapdoor Function Hides up to <i>O</i>(<i>n</i>) Bits.
J. Cryptol., 2002

2001
Lattice Attacks on Digital Signature Schemes.
Des. Codes Cryptogr., 2001

The Bit Security of Paillier's Encryption Scheme and Its Applications.
Proceedings of the Advances in Cryptology, 2001

Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

Paillier's cryptosystem revisited.
Proceedings of the CCS 2001, 2001

Approximate Integer Common Divisors.
Proceedings of the Cryptography and Lattices, International Conference, 2001

The Modular Inversion Hidden Number Problem.
Proceedings of the Advances in Cryptology, 2001

1999
Factoring N = p<sup>r</sup>q for Large r.
Proceedings of the Advances in Cryptology, 1999

Extending Wiener's Attack in the Presence of Many Decrypting Exponents.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1997
Finding Small Roots of Univariate Modular Equations Revisited.
Proceedings of the Cryptography and Coding, 1997


  Loading...